Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage
It is secure for customers to store and share their sensitive data in the cryptographic cloud storage.However,the revocation operation is a sure performance killer in the cryptographic access control system.To optimize the revocation procedure,we present a new efficient revocation scheme which is ef...
Saved in:
Published in | Frontiers of information technology & electronic engineering Vol. 14; no. 2; pp. 85 - 97 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
Heidelberg
SP Zhejiang University Press
01.02.2013
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
ISSN | 1869-1951 2095-9184 1869-196X 2095-9230 |
DOI | 10.1631/jzus.C1200240 |
Cover
Loading…
Abstract | It is secure for customers to store and share their sensitive data in the cryptographic cloud storage.However,the revocation operation is a sure performance killer in the cryptographic access control system.To optimize the revocation procedure,we present a new efficient revocation scheme which is efficient,secure,and unassisted.In this scheme,the original data are first divided into a number of slices,and then published to the cloud storage.When a revocation occurs,the data owner needs only to retrieve one slice,and re-encrypt and re-publish it.Thus,the revocation process is accelerated by affecting only one slice instead of the whole data.We have applied the efficient revocation scheme to the ciphertext-policy attribute-based encryption(CP-ABE) based cryptographic cloud storage.The security analysis shows that our scheme is computationally secure.The theoretically evaluated and experimentally measured performance results show that the efficient revocation scheme can reduce the data owner’s workload if the revocation occurs frequently. |
---|---|
AbstractList | It is secure for customers to store and share their sensitive data in the cryptographic cloud storage. However, the revocation operation is a sure performance killer in the cryptographic access control system. To optimize the revocation procedure, we present a new efficient revocation scheme which is efficient, secure, and unassisted. In this scheme, the original data are first divided into a number of slices, and then published to the cloud storage. When a revocation occurs, the data owner needs only to retrieve one slice, and re-encrypt and re-publish it. Thus, the revocation process is accelerated by affecting only one slice instead of the whole data. We have applied the efficient revocation scheme to the ciphertext-policy attribute-based encryption (CP-ABE) based cryptographic cloud storage. The security analysis shows that our scheme is computationally secure. The theoretically evaluated and experimentally measured performance results show that the efficient revocation scheme can reduce the data owner’s workload if the revocation occurs frequently. It is secure for customers to store and share their sensitive data in the cryptographic cloud storage. However, the revocation operation is a sure performance killer in the cryptographic access control system. To optimize the revocation procedure, we present a new efficient revocation scheme which is efficient, secure, and unassisted. In this scheme, the original data are first divided into a number of slices, and then published to the cloud storage. When a revocation occurs, the data owner needs only to retrieve one slice, and re-encrypt and re-publish it. Thus, the revocation process is accelerated by affecting only one slice instead of the whole data. We have applied the efficient revocation scheme to the ciphertext-policy attribute-based encryption (CP-ABE) based cryptographic cloud storage. The security analysis shows that our scheme is computationally secure. The theoretically evaluated arid experimentally measured performance results show that the efficient revocation scheme can reduce the data owner's workload if the revocation occurs frequently. It is secure for customers to store and share their sensitive data in the cryptographic cloud storage.However,the revocation operation is a sure performance killer in the cryptographic access control system.To optimize the revocation procedure,we present a new efficient revocation scheme which is efficient,secure,and unassisted.In this scheme,the original data are first divided into a number of slices,and then published to the cloud storage.When a revocation occurs,the data owner needs only to retrieve one slice,and re-encrypt and re-publish it.Thus,the revocation process is accelerated by affecting only one slice instead of the whole data.We have applied the efficient revocation scheme to the ciphertext-policy attribute-based encryption(CP-ABE) based cryptographic cloud storage.The security analysis shows that our scheme is computationally secure.The theoretically evaluated and experimentally measured performance results show that the efficient revocation scheme can reduce the data owner’s workload if the revocation occurs frequently. |
Author | Yong CHENG Zhi-ying WANG Jun MA Jiang-jiang WU Song-zhu MEI Jiang-chun REN |
AuthorAffiliation | School of Computer,National University of Defense Technology,Changsha 410073,China |
Author_xml | – sequence: 1 givenname: Yong surname: Cheng fullname: Cheng, Yong email: ycheng@nudt.edu.cn organization: School of Computer, National University of Defense Technology – sequence: 2 givenname: Zhi-ying surname: Wang fullname: Wang, Zhi-ying organization: School of Computer, National University of Defense Technology – sequence: 3 givenname: Jun surname: Ma fullname: Ma, Jun organization: School of Computer, National University of Defense Technology – sequence: 4 givenname: Jiang-jiang surname: Wu fullname: Wu, Jiang-jiang organization: School of Computer, National University of Defense Technology – sequence: 5 givenname: Song-zhu surname: Mei fullname: Mei, Song-zhu organization: School of Computer, National University of Defense Technology – sequence: 6 givenname: Jiang-chun surname: Ren fullname: Ren, Jiang-chun organization: School of Computer, National University of Defense Technology |
BookMark | eNp1kEtLxDAUhYMoqKNL9xU3bjrm1bRZyuALBDcK7kqa3sxkqElNUnH89XZmfIBgNnnwnXNPziHadd4BQicET4lg5GL5McTpjFCMKcc76IBUQuZEiufdn3NB9tFxjEs8LlYUUrADZK6MsdqCS1mAN69Vst5l1mXa9gsICd5T3vvO6lWmUgq2GRLkjYrQZuB0WPUbfvuwufp5UP3C6kx3fmizmHxQczhCe0Z1EY6_9gl6ur56nN3m9w83d7PL-1wzwVJuqDGtaJiAxnBJJOWgcdXgRsoKKC4MMFFJXJYNb3ApVEuV5LosccVbBpSzCTrf-vbBvw4QU_1io4auUw78EGvCeVVyRsfKJujsD7r0Q3BjuppKUpWjm8AjlW8pHXyMAUzdB_uiwqomuF4XX6-Lr7-LH3n2h9c2bUpNQdnuX9V0q4qju5tD-M3yn-D0a8zCu_nrqPnJtf5hQSRjn7HCpdk |
CitedBy_id | crossref_primary_10_1080_01969722_2023_2166263 crossref_primary_10_1016_j_cose_2020_102074 crossref_primary_10_1007_s10586_018_2200_5 crossref_primary_10_1109_TCE_2023_3331306 crossref_primary_10_1109_MIS_2013_140 crossref_primary_10_3390_s19071695 crossref_primary_10_1016_j_future_2018_05_032 crossref_primary_10_1371_journal_pone_0307039 crossref_primary_10_1631_FITEE_1500219 crossref_primary_10_1016_j_future_2016_08_018 crossref_primary_10_1109_ACCESS_2019_2925390 crossref_primary_10_1007_s10586_020_03069_3 crossref_primary_10_1631_FITEE_2000366 crossref_primary_10_1155_2022_7291250 crossref_primary_10_2139_ssrn_4526403 crossref_primary_10_1049_iet_com_2015_0608 crossref_primary_10_1007_s11036_018_1102_3 crossref_primary_10_1093_comjnl_bxz101 crossref_primary_10_1007_s11277_015_2990_1 |
Cites_doi | 10.1109/INFCOM.2010.5462174 10.1109/SP.2008.12 10.1145/1755688.1755690 10.1109/SISW.2005.7 10.1145/1180405.1180418 10.1145/1966913.1966970 10.1145/2087522.2087530 10.1145/62044.62050 10.1109/TrustCom.2012.136 10.1109/TIT.2011.2104470 10.1109/TDSC.2012.49 10.1145/1533057.1533094 10.1007/978-1-4419-7659-8 10.1109/SP.2007.11 10.1145/1755688.1755720 10.1145/2414456.2414507 10.1109/SP.2010.23 10.1145/359168.359176 10.1007/978-3-642-14992-4_13 |
ContentType | Journal Article |
Copyright | Journal of Zhejiang University Science Editorial Office and Springer-Verlag Berlin Heidelberg 2013 Journal of Zhejiang University Science Editorial Office and Springer-Verlag Berlin Heidelberg 2013. |
Copyright_xml | – notice: Journal of Zhejiang University Science Editorial Office and Springer-Verlag Berlin Heidelberg 2013 – notice: Journal of Zhejiang University Science Editorial Office and Springer-Verlag Berlin Heidelberg 2013. |
DBID | 2RA 92L CQIGP ~WA AAYXX CITATION 8FE 8FG ABJCF AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L6V M7S P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS 7SC 8FD L7M L~C L~D |
DOI | 10.1631/jzus.C1200240 |
DatabaseName | 维普期刊资源整合服务平台 中文科技期刊数据库-CALIS站点 维普中文期刊数据库 中文科技期刊数据库- 镜像站点 CrossRef ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Database Suite (ProQuest) Technology Collection ProQuest One Community College ProQuest Central Korea ProQuest Central Student SciTech Collection (ProQuest) ProQuest Computer Science Collection Computer Science Database ProQuest Engineering Collection Engineering Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection Computer and Information Systems Abstracts Technology Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Engineering Collection Advanced Technologies & Aerospace Collection Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition Materials Science & Engineering Collection ProQuest One Academic ProQuest One Academic (New) Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer Science Database Computer and Information Systems Abstracts |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
DocumentTitleAlternate | Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage |
EISSN | 1869-196X 2095-9230 |
EndPage | 97 |
ExternalDocumentID | 10_1631_jzus_C1200240 44875193 |
GroupedDBID | -59 -5G -BR -~C 06D 0R~ 0VY 1N0 2KG 2RA 2VQ 30V 4.4 408 40D 67Z 92L AARTL AAWCG ABFTV ABJOX ABKCH ABTMW ACGFS ADURQ ADYFF AEKMD AEOHA AEXYK AFWTZ AGDGC AGQMX AIIXL AJRNO ALMA_UNASSIGNED_HOLDINGS AMKLP BGNMA CQIGP DPUIP EBS EJD GQ6 HF~ HMJXF HRMNR HZ~ I0C I~Z JBSCW KOV M4Y MA- NQJWS NU0 O9- P9O R9I RIG RLLFE RSV S1Z S27 S3B SCL SCO SHX SNX SOJ T13 TR2 TSG U2A UG4 VC2 ~A9 ~WA ROL AAYXX CITATION -SI -S~ 406 5VR 8FE 8FG 96X AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAPKM AARHV AASML AATNV AATVU AAUYE AAYIU AAYTO AAYZH AAZMS ABAKF ABBRH ABDBE ABDZT ABECU ABFSG ABFTD ABJCF ABJNI ABMQK ABQBU ABRTQ ABSXP ABTHY ABTKH ABXPI ACAOD ACBXY ACDTI ACHSB ACIWK ACKNC ACMDZ ACMLO ACOKC ACPIV ACSTC ACZOJ ADKNI ADKPE ADRFC ADZKW AEBTG AEFQL AEGNC AEJHL AEJRE AEMSY AENEX AESKC AETCA AEVLU AEZWR AFBBN AFDZB AFHIU AFKRA AFLOW AFQWF AFUIB AFZKB AGAYW AGJBK AGMZJ AGQEE AGRTI AGWZB AGYKE AHBYD AHKAY AHPBZ AHWEU AHYZX AIAKS AIGIU AILAN AITGF AIXLP AJBLW AJZVZ ALFXC AMXSW AMYLF ANMIH AOCGG ARAPS ATHPR AXYYD AYFIA AZQEC BENPR BGLVJ CAJEI CCEZO CCPQU CHBEP CUBFJ CW9 DDRTE DNIVK DWQXO EBLON EIOEI FERAY FIGPU FINBP FNLPD FRRFC FSGXE FYJPI GGCAI GGRSB GNUQQ HCIFZ IKXTQ IWAJR J-C JQ2 JUIAU JZLTJ K7- L6V LLZTM M7S NPVJJ O9J P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PT4 PTHSS Q-- S.. SJYHP SNE SNPRN SOHCF SPISZ SRMVM SSLCW TCJ TGT U1G U5S UOJIU UTJUX UZXMN VFIZW ZMTXR 7SC 8FD L7M L~C L~D |
ID | FETCH-LOGICAL-c363t-f2ffd6b36ebf491924ec08b0b998e205fe3689077b4b076ad2a94c77084d3e243 |
IEDL.DBID | U2A |
ISSN | 1869-1951 2095-9184 |
IngestDate | Fri Jul 11 07:27:27 EDT 2025 Wed Aug 13 06:10:05 EDT 2025 Tue Jul 01 01:34:08 EDT 2025 Thu Apr 24 23:02:30 EDT 2025 Fri Feb 21 02:35:19 EST 2025 Wed Feb 14 10:43:57 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 2 |
Keywords | TP309.2 Cryptographic access control Revocation optimization Cloud storage |
Language | English |
License | http://www.springer.com/tdm |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c363t-f2ffd6b36ebf491924ec08b0b998e205fe3689077b4b076ad2a94c77084d3e243 |
Notes | Yong CHENG ,Zhi-ying WANG,Jun MA,Jiang-jiang WU,Song-zhu MEI,Jiang-chun REN(School of Computer,National University of Defense Technology,Changsha 410073,China) Revocation optimization; Cryptographic access control; Cloud storage It is secure for customers to store and share their sensitive data in the cryptographic cloud storage.However,the revocation operation is a sure performance killer in the cryptographic access control system.To optimize the revocation procedure,we present a new efficient revocation scheme which is efficient,secure,and unassisted.In this scheme,the original data are first divided into a number of slices,and then published to the cloud storage.When a revocation occurs,the data owner needs only to retrieve one slice,and re-encrypt and re-publish it.Thus,the revocation process is accelerated by affecting only one slice instead of the whole data.We have applied the efficient revocation scheme to the ciphertext-policy attribute-based encryption(CP-ABE) based cryptographic cloud storage.The security analysis shows that our scheme is computationally secure.The theoretically evaluated and experimentally measured performance results show that the efficient revocation scheme can reduce the data owner’s workload if the revocation occurs frequently. ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 ObjectType-Article-2 ObjectType-Feature-1 content type line 23 |
PQID | 2918724360 |
PQPubID | 2044401 |
PageCount | 13 |
ParticipantIDs | proquest_miscellaneous_1448743216 proquest_journals_2918724360 crossref_primary_10_1631_jzus_C1200240 crossref_citationtrail_10_1631_jzus_C1200240 springer_journals_10_1631_jzus_C1200240 chongqing_primary_44875193 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2013-02-01 |
PublicationDateYYYYMMDD | 2013-02-01 |
PublicationDate_xml | – month: 02 year: 2013 text: 2013-02-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | Heidelberg |
PublicationPlace_xml | – name: Heidelberg |
PublicationSubtitle | Computers & Electronics |
PublicationTitle | Frontiers of information technology & electronic engineering |
PublicationTitleAbbrev | J. Zhejiang Univ. - Sci. C |
PublicationTitleAlternate | Journal of zhejiang university science |
PublicationYear | 2013 |
Publisher | SP Zhejiang University Press Springer Nature B.V |
Publisher_xml | – name: SP Zhejiang University Press – name: Springer Nature B.V |
References | Goyal, V., Pandey, O., Sahai, A., Waters, B., 2006. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. Proc. 13th ACM Conf. on Computer and Communications Security, p.89–98. [doi:10.1145/1180405.1180418] RivestR.All-or-nothing encryption and the package transformLNCS19971267210218 WatersB.Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realizationLNCS2011657153702804908 Resch, J.K., Plank, J.S., 2011. AONT-RS: Blending Security and Performance in Dispersed Storage Systems. Proc. 9th Usenix Conf. on File and Storage Technologies, p.191–202. ShamirA.How to share a secretCommun. ACM197922116126135492520414.9402110.1145/359168.359176 Geambasu, R., Kohno, T., Levy, A., Levy, H.M., 2009. Vanish: Increasing Data Privacy with Self-Destructing Data. Proc. 18th USENIX Security Symp., p.299–333. Lewko, A., Sahai, A., Waters, B., 2010. Revocation Systems with Very Small Private Keys. IEEE Symp. on Security and Privacy, p.273–285. [doi:10.1109/SP.2010.23] Jahid, S., Mittal, P., Borisov, N., 2011. Easier: Encryption-Based Access Control in Social Networks with Efficient Revocation. Proc. 6th ACM Symp. on Information, Computer and Communications Security, p.411–415. [doi:10.1145/1966913.1966970] Liang, X., Cao, Z., Lin, H., Shao, J., 2009. Attribute Based Proxy Re-encryption with Delegating Capabilities. Proc. 4th Int. Symp. on Information, Computer, and Communications Security, p.276–286. [doi:10.1145/1533057.1533094] Foresti, S., 2010. Preserving Privacy in Data Outsourcing. Springer. [doi:10.1007/978-1-4419-7659-8] Amazon, 2012. Amazon Simple Storage Service. Available from http://aws.amazon.com/s3/ [Accessed on June 11, 2012]. BlazeM.BleumerG.StraussM.Divertible protocols and atomic proxy cryptographyLNCS199814031271441729054 LibertB.VergnaudD.Unidirectional chosenciphertext secure proxy re-encryptionIEEE Trans. Inf. Theory201157317861802281585210.1109/TIT.2011.2104470 Bethencourt, J., Sahai, A., Waters, B., 2012. Ciphertext-Policy Attribute-Based Encryption. Available from http://acsc.cs.utexas.edu/cpabe/ [Accessed on June 10, 2012]. Samarati, P., di Vimercati, S.D.C., 2010. Data Protection in Outsourcing Scenarios: Issues and Directions. Proc. 5th ACM Symp. on Information, Computer and Communications Security, p.1–14. [doi:10.1145/1755688.1755690] Kamara, S., Lauter, K., 2010. Cryptographic Cloud Storage. Proc. 14th Int. Conf. on Financial Cryptography and Data Security, p.136–149. [doi:10.1007/978-3-642-14992-4_13] TangY.LeeP.LuiJ.PerlmanR.Secure overlay cloud storage with access control and assured deletionIEEE Trans. Depend. Sec. Comput.20129690391610.1109/TDSC.2012.49 Kumbhare, A.G., Simmhan, Y., Prasanna, V., 2011. Designing a Secure Storage Repository for Sharing Scientific Datasets Using Public Clouds. Proc. 2nd Int. Workshop on Data Intensive Computing in the Clouds, p.31–40. [doi:10.1145/2087522.2087530] RabinM.O.Efficient dispersal of information for security, load balancing, and fault toleranceJ. ACM198936233534810724240677.6802410.1145/62044.62050 Blanchet, B., Chaudhuri, A., 2008. Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage. IEEE Symp. on Security and Privacy, p.417–431. [doi:10.1109/SP.2008.12] di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P., 2007. Over-Encryption: Management of Access Control Evolution on Outsourced Data. Proc. 33rd Int. Conf. on Very Large Data Bases, p.123–134. OpenSSL, 2012. OpenSSL: Cryptography and SSL/TLS Toolkit. Available from http://www.openssl.org/ [Accessed on July 26, 2012]. Bethencourt, J., Sahai, A., Waters, B., 2007. Ciphertext-Policy Attribute-Based Encryption. IEEE Symp. on Security and Privacy, p.321–334. [doi:10.1109/SP.2007.11] SahaiA.WatersB.Fuzzy identity-based encryptionLNCS200534945575572352204 Xu, L., Wu, X., Zhang, X., 2012. CL-PRE: a Certificateless Proxy Re-encryption Scheme for Secure Data Sharing with Public Cloud. Proc. 7th ACM Symp. on Information, Computer and Communications Security, p.1–10. Yu, S., Wang, C., Ren, K., Lou, W., 2010a. Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing. IEEE INFOCOM, p.1–9. [doi:10.1109/INFCOM.2010.5462174] Backes, M., Cachin, C., Oprea, A., 2005. Lazy Revocation in Cryptographic File Systems. Proc. 3rd IEEE Int. Security in Storage Workshop, p.1–11. [doi:10.1109/SISW.2005.7] Yu, S., Wang, C., Ren, K., Lou, W., 2010b. Attribute Based Data Sharing with Attribute Revocation. Proc. 5th ACM Symp. on Information, Computer and Communications Security, p.261–270. [doi:10.1145/1755688.1755720] Plank, J.S., Simmerman, S., Schuman, C.D., 2008. Jerasure: a Library in C/C++ Facilitating Erasure Coding for Storage Applications, Version 1.2. Available from http://web.eecs.utk.edu/~plank/plank/papers/CS-08-627.html [Accessed on June 29, 2012]. BonehD.GentryC.WatersB.Collusion resistant broadcast encryption with short ciphertexts and private keysLNCS200536212582752237311 Xu, Z., Martin, K.M., 2012. Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage. Proc. 11th Int. Conf. on Trust, Security and Privacy in Computing and Communications, p.844–849. [doi:10.1109/TrustCom.2012.136] Hadoop, 2012. HDFS Architecture Guide. Available from http://hadoop.apache.org/docs/hdfs/current/hdfs_design.html [Accessed on June 28, 2012]. Storer, M.W., Greenan, K.M., Miller, E.L., Voruganti, K., 2007. Potshards: Secure Long-Term Storage without Encryption. Proc. USENIX Annual Technical Conf., p.1–11. B. Waters (1378_CR29) 2011; 6571 1378_CR17 B. Libert (1378_CR18) 2011; 57 1378_CR16 1378_CR19 M.O. Rabin (1378_CR21) 1989; 36 A. Shamir (1378_CR26) 1979; 22 A. Sahai (1378_CR24) 2005; 3494 1378_CR13 1378_CR12 1378_CR15 1378_CR14 1378_CR31 1378_CR30 1378_CR11 1378_CR33 1378_CR10 1378_CR32 1378_CR27 D. Boneh (1378_CR7) 2005; 3621 R. Rivest (1378_CR23) 1997; 1267 Y. Tang (1378_CR28) 2012; 9 1378_CR2 1378_CR1 1378_CR5 1378_CR4 1378_CR3 1378_CR25 1378_CR20 1378_CR9 1378_CR8 1378_CR22 M. Blaze (1378_CR6) 1998; 1403 |
References_xml | – reference: Kumbhare, A.G., Simmhan, Y., Prasanna, V., 2011. Designing a Secure Storage Repository for Sharing Scientific Datasets Using Public Clouds. Proc. 2nd Int. Workshop on Data Intensive Computing in the Clouds, p.31–40. [doi:10.1145/2087522.2087530] – reference: Geambasu, R., Kohno, T., Levy, A., Levy, H.M., 2009. Vanish: Increasing Data Privacy with Self-Destructing Data. Proc. 18th USENIX Security Symp., p.299–333. – reference: Goyal, V., Pandey, O., Sahai, A., Waters, B., 2006. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. Proc. 13th ACM Conf. on Computer and Communications Security, p.89–98. [doi:10.1145/1180405.1180418] – reference: Liang, X., Cao, Z., Lin, H., Shao, J., 2009. Attribute Based Proxy Re-encryption with Delegating Capabilities. Proc. 4th Int. Symp. on Information, Computer, and Communications Security, p.276–286. [doi:10.1145/1533057.1533094] – reference: Yu, S., Wang, C., Ren, K., Lou, W., 2010b. Attribute Based Data Sharing with Attribute Revocation. Proc. 5th ACM Symp. on Information, Computer and Communications Security, p.261–270. [doi:10.1145/1755688.1755720] – reference: OpenSSL, 2012. OpenSSL: Cryptography and SSL/TLS Toolkit. Available from http://www.openssl.org/ [Accessed on July 26, 2012]. – reference: Amazon, 2012. Amazon Simple Storage Service. Available from http://aws.amazon.com/s3/ [Accessed on June 11, 2012]. – reference: Foresti, S., 2010. Preserving Privacy in Data Outsourcing. Springer. [doi:10.1007/978-1-4419-7659-8] – reference: Storer, M.W., Greenan, K.M., Miller, E.L., Voruganti, K., 2007. Potshards: Secure Long-Term Storage without Encryption. Proc. USENIX Annual Technical Conf., p.1–11. – reference: Xu, L., Wu, X., Zhang, X., 2012. CL-PRE: a Certificateless Proxy Re-encryption Scheme for Secure Data Sharing with Public Cloud. Proc. 7th ACM Symp. on Information, Computer and Communications Security, p.1–10. – reference: Hadoop, 2012. HDFS Architecture Guide. Available from http://hadoop.apache.org/docs/hdfs/current/hdfs_design.html [Accessed on June 28, 2012]. – reference: Backes, M., Cachin, C., Oprea, A., 2005. Lazy Revocation in Cryptographic File Systems. Proc. 3rd IEEE Int. Security in Storage Workshop, p.1–11. [doi:10.1109/SISW.2005.7] – reference: SahaiA.WatersB.Fuzzy identity-based encryptionLNCS200534945575572352204 – reference: Xu, Z., Martin, K.M., 2012. Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage. Proc. 11th Int. Conf. on Trust, Security and Privacy in Computing and Communications, p.844–849. [doi:10.1109/TrustCom.2012.136] – reference: Blanchet, B., Chaudhuri, A., 2008. Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage. IEEE Symp. on Security and Privacy, p.417–431. [doi:10.1109/SP.2008.12] – reference: Bethencourt, J., Sahai, A., Waters, B., 2012. Ciphertext-Policy Attribute-Based Encryption. Available from http://acsc.cs.utexas.edu/cpabe/ [Accessed on June 10, 2012]. – reference: Jahid, S., Mittal, P., Borisov, N., 2011. Easier: Encryption-Based Access Control in Social Networks with Efficient Revocation. Proc. 6th ACM Symp. on Information, Computer and Communications Security, p.411–415. [doi:10.1145/1966913.1966970] – reference: BonehD.GentryC.WatersB.Collusion resistant broadcast encryption with short ciphertexts and private keysLNCS200536212582752237311 – reference: Lewko, A., Sahai, A., Waters, B., 2010. Revocation Systems with Very Small Private Keys. IEEE Symp. on Security and Privacy, p.273–285. [doi:10.1109/SP.2010.23] – reference: LibertB.VergnaudD.Unidirectional chosenciphertext secure proxy re-encryptionIEEE Trans. Inf. Theory201157317861802281585210.1109/TIT.2011.2104470 – reference: Samarati, P., di Vimercati, S.D.C., 2010. Data Protection in Outsourcing Scenarios: Issues and Directions. Proc. 5th ACM Symp. on Information, Computer and Communications Security, p.1–14. [doi:10.1145/1755688.1755690] – reference: Resch, J.K., Plank, J.S., 2011. AONT-RS: Blending Security and Performance in Dispersed Storage Systems. Proc. 9th Usenix Conf. on File and Storage Technologies, p.191–202. – reference: RabinM.O.Efficient dispersal of information for security, load balancing, and fault toleranceJ. ACM198936233534810724240677.6802410.1145/62044.62050 – reference: WatersB.Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realizationLNCS2011657153702804908 – reference: di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P., 2007. Over-Encryption: Management of Access Control Evolution on Outsourced Data. Proc. 33rd Int. Conf. on Very Large Data Bases, p.123–134. – reference: Plank, J.S., Simmerman, S., Schuman, C.D., 2008. Jerasure: a Library in C/C++ Facilitating Erasure Coding for Storage Applications, Version 1.2. Available from http://web.eecs.utk.edu/~plank/plank/papers/CS-08-627.html [Accessed on June 29, 2012]. – reference: BlazeM.BleumerG.StraussM.Divertible protocols and atomic proxy cryptographyLNCS199814031271441729054 – reference: ShamirA.How to share a secretCommun. ACM197922116126135492520414.9402110.1145/359168.359176 – reference: Yu, S., Wang, C., Ren, K., Lou, W., 2010a. Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing. IEEE INFOCOM, p.1–9. [doi:10.1109/INFCOM.2010.5462174] – reference: Kamara, S., Lauter, K., 2010. Cryptographic Cloud Storage. Proc. 14th Int. Conf. on Financial Cryptography and Data Security, p.136–149. [doi:10.1007/978-3-642-14992-4_13] – reference: RivestR.All-or-nothing encryption and the package transformLNCS19971267210218 – reference: TangY.LeeP.LuiJ.PerlmanR.Secure overlay cloud storage with access control and assured deletionIEEE Trans. Depend. Sec. Comput.20129690391610.1109/TDSC.2012.49 – reference: Bethencourt, J., Sahai, A., Waters, B., 2007. Ciphertext-Policy Attribute-Based Encryption. IEEE Symp. on Security and Privacy, p.321–334. [doi:10.1109/SP.2007.11] – ident: 1378_CR1 – ident: 1378_CR22 – ident: 1378_CR32 doi: 10.1109/INFCOM.2010.5462174 – ident: 1378_CR5 doi: 10.1109/SP.2008.12 – ident: 1378_CR25 doi: 10.1145/1755688.1755690 – ident: 1378_CR20 – ident: 1378_CR2 doi: 10.1109/SISW.2005.7 – volume: 3494 start-page: 557 year: 2005 ident: 1378_CR24 publication-title: LNCS – ident: 1378_CR11 doi: 10.1145/1180405.1180418 – ident: 1378_CR13 doi: 10.1145/1966913.1966970 – ident: 1378_CR15 doi: 10.1145/2087522.2087530 – volume: 36 start-page: 335 issue: 2 year: 1989 ident: 1378_CR21 publication-title: J. ACM doi: 10.1145/62044.62050 – ident: 1378_CR31 doi: 10.1109/TrustCom.2012.136 – volume: 57 start-page: 1786 issue: 3 year: 2011 ident: 1378_CR18 publication-title: IEEE Trans. Inf. Theory doi: 10.1109/TIT.2011.2104470 – volume: 9 start-page: 903 issue: 6 year: 2012 ident: 1378_CR28 publication-title: IEEE Trans. Depend. Sec. Comput. doi: 10.1109/TDSC.2012.49 – ident: 1378_CR17 doi: 10.1145/1533057.1533094 – ident: 1378_CR9 doi: 10.1007/978-1-4419-7659-8 – ident: 1378_CR3 doi: 10.1109/SP.2007.11 – volume: 3621 start-page: 258 year: 2005 ident: 1378_CR7 publication-title: LNCS – ident: 1378_CR19 – ident: 1378_CR27 – ident: 1378_CR8 – ident: 1378_CR4 – ident: 1378_CR33 doi: 10.1145/1755688.1755720 – volume: 6571 start-page: 53 year: 2011 ident: 1378_CR29 publication-title: LNCS – ident: 1378_CR30 doi: 10.1145/2414456.2414507 – ident: 1378_CR12 – volume: 1403 start-page: 127 year: 1998 ident: 1378_CR6 publication-title: LNCS – ident: 1378_CR10 – volume: 1267 start-page: 210 year: 1997 ident: 1378_CR23 publication-title: LNCS – ident: 1378_CR16 doi: 10.1109/SP.2010.23 – volume: 22 start-page: 612 issue: 11 year: 1979 ident: 1378_CR26 publication-title: Commun. ACM doi: 10.1145/359168.359176 – ident: 1378_CR14 doi: 10.1007/978-3-642-14992-4_13 |
SSID | ssj0000355963 ssj0001619798 |
Score | 2.1079721 |
Snippet | It is secure for customers to store and share their sensitive data in the cryptographic cloud storage.However,the revocation operation is a sure performance... It is secure for customers to store and share their sensitive data in the cryptographic cloud storage. However, the revocation operation is a sure performance... |
SourceID | proquest crossref springer chongqing |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 85 |
SubjectTerms | Access control Algorithms Aridity Cloud computing Communications Engineering Computer Hardware Computer Science Computer Systems Organization and Communication Networks Cryptography Customers Data storage Electrical Engineering Electronics and Microelectronics Encryption Instrumentation Networks Stores Workload 学术论文 期刊 编辑工作 英文摘要 |
SummonAdditionalLinks | – databaseName: ProQuest Central Database Suite (ProQuest) dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Lb9QwELagvcAB8apIKchIqFxI69heJzkhqLaqkKgqRKXeoowfsKhKtvtAgl_PjOPsAgKOSSw78oxn5huPvmHspQLpS9mGHDwAAhQIeasCpcOsAGlRpRwBxQ_n5uxSv7-aXKWE2zKVVY42MRpq11vKkR_LuqhKqZURb-Y3OXWNotvV1ELjNttFE1wh-Np9Nz2_-LjNsiA-KGNDXCliU8JKJ6JNo4rjrz_Wy6OTQkaiLyJX-NJ3n2_QZfzupLaR5x-XpdEHnd5n91LwyN8O0n7AbvnuIbv7C6XgIxamkRMCXQlf-G_9kJDjs47bGREIUJ1HPo9cwLxdDd2ufE6uzHHU18X3aEH48CI-DpTWM8vtdb92nIop0QQ9Zpen008nZ3nqpZBbZdQqDzIEZ0AZD0HXhLq8FRUIQLjlpZgEr0yFQLkEDaI0rZNtrW1Ziko75XHf99hO13f-CePGWTmxZRVqBdqiAQAw3tTgla-Esz5j-5uNbOYDZ0ajCRhhsJix1-PONjaxkFMzjOuG0AgKpSGhNKNQMna4GT5O9Y-BB6OYmnQKl81WZzL2YvMZzw9dirSd73GCgv5MK1mYjL0axbud4q-L7f9_safsjoxNM6jo5YDtrBZr_wxDlxU8T_r5E_Bn8EI priority: 102 providerName: ProQuest |
Title | Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage |
URI | http://lib.cqvip.com/qk/89589X/201302/44875193.html https://link.springer.com/article/10.1631/jzus.C1200240 https://www.proquest.com/docview/2918724360 https://www.proquest.com/docview/1448743216 |
Volume | 14 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB71cYED0AJiS1kZqSoXQhPb6yTHUu1SVaKqKlbqLco4NiyqkrLdrVR-PTNOsuXRShyTWGPL4_HMZ0--AdhTKF0qSx-hQySAgj4qlefjMBujtLSkKgaKn0_N8VSfXIwu1uCg_xcmZLv3V5Jhp2azNio5-P5zef3hKJGBlWsdNkcM22kBT-Xh6lAlJu-Zh-ppXGkpSih86Hg1_5HAXArfmvrrD-rpT590F2j-dTcaXM7kGTzpYkVx2Cp3C9ZcvQ1P-zoMojPLbXj8G6ngc_DjwApBzkTM3U3THsmJWS3sjCkEONMjugpswKJctPWuXMTOrBIkbn4b9hDRvgiPLan1zAp72SwrwemUtAm9gOlk_OXoOOqqKURWGbWIvPS-MqiMQ69zxl3OxhnGSIDLyXjknTIZQeUUNcapKStZ5tqmaZzpSjmp1UvYqJvavQJhKitHNs18rlBb2gIQjTM5OuWyuLJuADuruS2uWtaMQjM0onBxAO_7yS5sx0PO5TAuC8YjpKeC9VT0ehrA_qp5L-qBhru95orODq8LmSdZSmM39Pnt6jNZEF-LlLVrSEDCI9NKJmYA73qN34m4t7Od_275Gh7JUEGDM2B2YWMxX7o3FMcscAjr2eTTEDY_jk_PzodhJf8CtPfzwA |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VcgAOiKdIKWAkHhfSJrbXSQ4IodJlSx-nVurNxI4Ni6pkuw9Q-VH8RmacZBcQcOsxiWVbnpe_sfMNwDNhuMt46WPjjEGAYnxcCk_pMJsYblGlKgKKh0dqdCI_nA5O1-BH_y8MXavsfWJw1FVjKUe-zYs0z7gUKnkzOY-pahSdrvYlNFq12HcX3xCyzV7vvUP5Pud8uHu8M4q7qgKxFUrMY8-9r5QRyhkvC8Ifzia5SQwCD8eTgXdC5QgZMyMNgvyy4mUhbZYluayEwxlgv1fgqhSiIIvKh-9XOR1EI1kov8uTUAIxlx2tpxLp9pfvi9nWTsoDrRhROXxu6k_nGKB-D4mrfe4fR7Mh4g1vwc1uq8retrp1G9ZcfQdu_EJgeBf8bmCgwMDFpu5r06b_2Lhmdkx0BXSrJJ4E5mFWztvaWi6mwFkxtI7pRfBXrH0RHlsC7bFl9qxZVIyubqLDuwcnl7LG92G9bmr3AJiqLB_YLPeFMNKiuzFGOVUYJ1yeVNZFsLFcSD1pGTq0JBiGW9MIXvUrq23HeU6lN840YR8Uiiah6F4oEbxYNu-7-kfDzV5MurP5mV5paARPl5_RWukIpqxdgx2kNDMpeKoieNmLd9XFXwfb-P9gT-Da6PjwQB_sHe0_hOs8lOug6zabsD6fLtwj3DTNzeOgqQw-XrZp_ATpGStf |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB6VIiF6oFBA3VLASAgupE1sr5OIU1W6Kq-KAyv1ZsUvWFQlyzaLBL--M06yLQUkjkmssePxvOzxNwDPheE-51VIjDcGAxQTkkoE2g6zqeEWl5SjQPHjiTqeynen49M1eD3chYnZ7sORZHengVCa6nZ_7kIUcSWy_W-_lud7hxmPCF034CZq4oyW9JQfrDZYUrSkZaykRlWXkgxdiR5j8w8KhKvwtam_fMdef7dPl07ntXPSaH4md-FO7zeyg47R92DN11uwOdRkYL2IbsHGFYDB-xCOIkIE_hhb-B9Ntz3HZjWzM4IToKyPZB6RgVnVdrWvfEKGzTEkt_gZ9QnrXsTHDuB6Zpk9a5aOUWolKqQHMJ0cfT48TvrKCokVSrRJ4CE4ZYTyJsiSYjBv08KkBoMvz9Nx8EIVGDbnRpo0V5XjVSltnqeFdMJzKR7Cet3UfhuYcpaPbV6EUhhpUR0Yo7wqjRe-SJ31I9hZza2edwgaWlKYhK7jCF4Nk61tj0lOpTHONMUmyCdNfNIDn0bwYtV8IPWPhrsD53Qvk-eal1mR49gVfn62-ozSREckVe0bJJDRyKTgmRrBy4HjlyT-2tnOf7d8Crc-vZnoD29P3j-C2zwW1qDEmF1YbxdL_xjdm9Y8icv4Apv1-G8 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Efficient+revocation+in+ciphertext-policy+attribute-based+encryption+based+cryptographic+cloud+storage&rft.jtitle=Journal+of+Zhejiang+University.+C+Science&rft.au=Cheng%2C+Y&rft.au=Wang%2C+Z-V&rft.au=Ma%2C+J&rft.au=Wu%2C+J-J&rft.date=2013-02-01&rft.issn=1869-1951&rft.volume=14&rft.issue=2&rft.spage=85&rft.epage=97&rft_id=info:doi/10.1631%2Fjzus.C1200240&rft.externalDBID=NO_FULL_TEXT |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F89589X%2F89589X.jpg |